-
1
-
-
85026467469
-
-
Gartner, accessed: 2016-03-7. [link]. URL.
-
Gartner, accessed: 2016-03-7. [link]. URL http://www.gartner.com/newsroom/id/3165317.
-
-
-
-
2
-
-
84981285674
-
Internet of things: from Internet scale sensing to smart services
-
Georgakopoulos, D., Jayaraman, P.P., Internet of things: from Internet scale sensing to smart services. Computing 98:10 (2016), 1041–1058.
-
(2016)
Computing
, vol.98
, Issue.10
, pp. 1041-1058
-
-
Georgakopoulos, D.1
Jayaraman, P.P.2
-
3
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I., Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10:7 (2012), 1497–1516.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
4
-
-
84893452444
-
Privacy-preserving wireless medical sensor network
-
IEEE
-
Yi, X., Willemson, J., Nait-Abdesselam, F., Privacy-preserving wireless medical sensor network. Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, 2013, IEEE, 118–125.
-
(2013)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
, pp. 118-125
-
-
Yi, X.1
Willemson, J.2
Nait-Abdesselam, F.3
-
5
-
-
84970006994
-
Privacy protection for wireless medical sensor data
-
Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J., Privacy protection for wireless medical sensor data. IEEE Trans. Dependable Secure Comput. 13:3 (2016), 369–380.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, vol.13
, Issue.3
, pp. 369-380
-
-
Yi, X.1
Bouguettaya, A.2
Georgakopoulos, D.3
Song, A.4
Willemson, J.5
-
6
-
-
84955487584
-
City data fusion: Sensor data fusion in the Internet of things
-
Ranjan, R., Wang, M., Perera, C., Jayaraman, P.P., Zhang, M., Strazdins, P., Shyamsundar, R., City data fusion: Sensor data fusion in the Internet of things. Int. J. Distrib. Syst. Technol. 7:1 (2016), 15–36.
-
(2016)
Int. J. Distrib. Syst. Technol.
, vol.7
, Issue.1
, pp. 15-36
-
-
Ranjan, R.1
Wang, M.2
Perera, C.3
Jayaraman, P.P.4
Zhang, M.5
Strazdins, P.6
Shyamsundar, R.7
-
7
-
-
85026441587
-
-
Privacy and security in the Internet of things: challenge or opportunity, accessed: 2016-03-7. URL.
-
B. Escribano, Privacy and security in the Internet of things: challenge or opportunity, accessed: 2016-03-7. URL http://www.olswang.com/articles/2014/11/privacy-and-security-in-the-internet-of-things-challenge-or-opportunity.
-
-
-
Escribano, B.1
-
8
-
-
84879243749
-
Cyber-physical-social based security architecture for future Internet of things
-
Huansheng Ning, H.L., Cyber-physical-social based security architecture for future Internet of things. Adv. Internet Things 2:1 (2012), 1–7.
-
(2012)
Adv. Internet Things
, vol.2
, Issue.1
, pp. 1-7
-
-
Huansheng Ning, H.L.1
-
9
-
-
85020892568
-
Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study
-
Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, A.M.N., Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurr. Comput. Practice Exper., 2016, 10.1002/cpe.3855.
-
(2016)
Concurr. Comput. Practice Exper.
-
-
Cahyani, N.D.W.1
Martini, B.2
Choo, K.-K.R.3
Al-Azhar, A.M.N.4
-
10
-
-
85018406878
-
Data exfiltration from Internet of things devices: ios devices as case studies
-
1–1.
-
DOrazio, C.J., Choo, K.K.R., Yang, L.T., Data exfiltration from Internet of things devices: ios devices as case studies. IEEE Internet Things J., PP(99), 2016 1–1. http://dx.doi.org/10.1109/JIOT.2016.2569094.
-
(2016)
IEEE Internet Things J.
, vol.PP
, Issue.99
-
-
DOrazio, C.J.1
Choo, K.K.R.2
Yang, L.T.3
-
11
-
-
84942465510
-
A cloud-focused mobile forensics methodology
-
Do, Q., Martini, B., Choo, K.K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.4
, pp. 60-65
-
-
Do, Q.1
Martini, B.2
Choo, K.K.R.3
-
12
-
-
84959862120
-
Secure authentication scheme for iot and cloud servers
-
Kalra, S., Sood, S.K., Secure authentication scheme for iot and cloud servers. Pervasive Mob. Comput. 24 (2015), 210–223.
-
(2015)
Pervasive Mob. Comput.
, vol.24
, pp. 210-223
-
-
Kalra, S.1
Sood, S.K.2
-
13
-
-
84893489554
-
An iterative hierarchical key exchange scheme for secure scheduling of big data applications in cloud computing
-
C. Liu, X. Zhang, C. Liu, Y. Yang, R. Ranjan, D. Georgakopoulos, J. Chen, An iterative hierarchical key exchange scheme for secure scheduling of big data applications in cloud computing, in: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, pp. 9–16.
-
(2013)
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 9-16
-
-
Liu, C.1
Zhang, X.2
Liu, C.3
Yang, Y.4
Ranjan, R.5
Georgakopoulos, D.6
Chen, J.7
-
14
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Neuman, B.C., Ts’~O, T., Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 32:9 (1994), 33–38.
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts’~O, T.2
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21:2 (1978), 120–126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
16
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM
-
Eschenauer, L., Gligor, V.D., A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, ACM, 41–47.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
17
-
-
51049107527
-
Ekg-based key agreement in body sensor networks
-
IEEE
-
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K., et al. Ekg-based key agreement in body sensor networks. INFOCOM Workshops 2008, IEEE, 2008, IEEE, 1–6.
-
(2008)
INFOCOM Workshops 2008, IEEE
, pp. 1-6
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.3
-
18
-
-
79955712919
-
Key management systems for sensor networks in the context of the Internet of things
-
Roman, R., Alcaraz, C., Lopez, J., Sklavos, N., Key management systems for sensor networks in the context of the Internet of things. Comput. Electr. Eng. 37:2 (2011), 147–159.
-
(2011)
Comput. Electr. Eng.
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
19
-
-
3042783638
-
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, 2003, pp. 42–51.
-
(2003)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
20
-
-
35048867517
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Springer
-
Camtepe, S.A., Yener, B., Combinatorial design of key distribution mechanisms for wireless sensor networks. Computer Security, ESORICS 04, 2004, Springer, 293–308.
-
(2004)
Computer Security, ESORICS 04
, pp. 293-308
-
-
Camtepe, S.A.1
Yener, B.2
-
21
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
ACM New York, NY, USA
-
Liu, D., Ning, P., Establishing pairwise keys in distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS'03, 2003, ACM, New York, NY, USA, 52–61.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS'03
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
22
-
-
84930767342
-
Oscar: Object security architecture for the Internet of things
-
Vuini, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., Guizzetti, R., Oscar: Object security architecture for the Internet of things. Ad Hoc Networks 32 (2015), 3–16.
-
(2015)
Ad Hoc Networks
, vol.32
, pp. 3-16
-
-
Vuini, M.1
Tourancheau, B.2
Rousseau, F.3
Duda, A.4
Damon, L.5
Guizzetti, R.6
-
23
-
-
84866380368
-
Secure communication for smart iot objects: Protocol stacks, use cases and practical examples
-
R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A. Serbanati, M. Rossi, Secure communication for smart iot objects: Protocol stacks, use cases and practical examples, in: World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, 2012, pp. 1–7.
-
(2012)
World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a
, pp. 1-7
-
-
Bonetto, R.1
Bui, N.2
Lakkundi, V.3
Olivereau, A.4
Serbanati, A.5
Rossi, M.6
-
24
-
-
84928805023
-
A secure and scalable storage system for aggregate data in iot
-
Jiang, H., Shen, F., Chen, S., Li, K.-C., Jeong, Y.-S., A secure and scalable storage system for aggregate data in iot. Future Gener. Comput. Syst. 49 (2015), 133–141.
-
(2015)
Future Gener. Comput. Syst.
, vol.49
, pp. 133-141
-
-
Jiang, H.1
Shen, F.2
Chen, S.3
Li, K.-C.4
Jeong, Y.-S.5
-
25
-
-
84900463079
-
Sensor discovery and configuration framework for the Internet of things paradigm
-
C. Perera, P.P. Jayaraman, A. Zaslavsky, D. Georgakopoulos, P. Christen, Sensor discovery and configuration framework for the Internet of things paradigm, in: 2014 IEEE World Forum on Internet of Things, WF-IoT, 2014, pp. 94–99.
-
(2014)
2014 IEEE World Forum on Internet of Things, WF-IoT
, pp. 94-99
-
-
Perera, C.1
Jayaraman, P.P.2
Zaslavsky, A.3
Georgakopoulos, D.4
Christen, P.5
-
26
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer
-
Sahai, A., Waters, B., Fuzzy identity-based encryption. Advances in Cryptology, EUROCRYPT 2005, 2005, Springer, 457–473.
-
(2005)
Advances in Cryptology, EUROCRYPT 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
27
-
-
79952071204
-
Fdac: Toward fine-grained distributed data access control in wireless sensor networks
-
Yu, S., Ren, K., Lou, W., Fdac: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22:4 (2011), 673–686.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
28
-
-
84914669929
-
Secure publish-subscribe protocols for heterogeneous medical wireless body area networks
-
Picazo-Sanchez, P., Tapiador, J.E., Peris-Lopez, P., Suarez-Tangil, G., Secure publish-subscribe protocols for heterogeneous medical wireless body area networks. Sensors 14:12 (2014), 22619–22642.
-
(2014)
Sensors
, vol.14
, Issue.12
, pp. 22619-22642
-
-
Picazo-Sanchez, P.1
Tapiador, J.E.2
Peris-Lopez, P.3
Suarez-Tangil, G.4
-
29
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. Advances in Cryptology, CRYPTO 2001, 2001, Springer, 213–229.
-
(2001)
Advances in Cryptology, CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
30
-
-
84863233964
-
An identity-based personal location system with protected privacy in iot
-
IEEE
-
Hu, C., Zhang, J., Wen, Q., An identity-based personal location system with protected privacy in iot. 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), 2011, IEEE, 192–195.
-
(2011)
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
, pp. 192-195
-
-
Hu, C.1
Zhang, J.2
Wen, Q.3
-
31
-
-
84876964561
-
Internet of things’ authentication and access control
-
Liu, J., Xiao, Y., Chen, C.P., Internet of things’ authentication and access control. Int. J. Secur. Netw. 7:4 (2012), 228–241.
-
(2012)
Int. J. Secur. Netw.
, vol.7
, Issue.4
, pp. 228-241
-
-
Liu, J.1
Xiao, Y.2
Chen, C.P.3
-
32
-
-
20544447851
-
Codeblue: An ad hoc sensor network infrastructure for emergency medical care
-
D. Malan, T. Fulford-Jones, M. Welsh, S. Moulton, Codeblue: An ad hoc sensor network infrastructure for emergency medical care, in: International Workshop on Wearable and Implantable Body Sensor Networks, 2004.
-
(2004)
International Workshop on Wearable and Implantable Body Sensor Networks
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
33
-
-
85026433746
-
-
Alarm-net: Wireless sensor networks for assisted-living and residential monitoring, University of Virginia Computer Science Department Technical Report 2.
-
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, J. Stankovic, Alarm-net: Wireless sensor networks for assisted-living and residential monitoring, University of Virginia Computer Science Department Technical Report 2.
-
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
34
-
-
77956373900
-
Medisn: Medical emergency detection in sensor networks
-
Ko, J., Lim, J.H., Chen, Y., Musvaloiu-E, R., Terzis, A., Masson, G.M., Gao, T., Destler, W., Selavo, L., Dutton, R.P., Medisn: Medical emergency detection in sensor networks. ACM Trans. Embedded Comput. Syst. (TECS), 10(1), 2010, 11.
-
(2010)
ACM Trans. Embedded Comput. Syst. (TECS)
, vol.10
, Issue.1
, pp. 11
-
-
Ko, J.1
Lim, J.H.2
Chen, Y.3
Musvaloiu-E, R.4
Terzis, A.5
Masson, G.M.6
Gao, T.7
Destler, W.8
Selavo, L.9
Dutton, R.P.10
-
35
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E., Spins: Security protocols for sensor networks. Wireless Netw. 8:5 (2002), 521–534.
-
(2002)
Wireless Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
36
-
-
84939126096
-
Privacy in Internet of things: A model and protection framework
-
Samani, A., Ghenniwa, H.H., Wahaishi, A., Privacy in Internet of things: A model and protection framework. Procedia Comput. Sci. 52 (2015), 606–613.
-
(2015)
Procedia Comput. Sci.
, vol.52
, pp. 606-613
-
-
Samani, A.1
Ghenniwa, H.H.2
Wahaishi, A.3
-
37
-
-
84879805810
-
Negotiation-based privacy preservation scheme in Internet of things platform
-
ACM New York, NY, USA
-
Ukil, A., Bandyopadhyay, S., Joseph, J., Banahatti, V., Lodha, S., Negotiation-based privacy preservation scheme in Internet of things platform. Proceedings of the First International Conference on Security of Internet of Things, SecurIT'12, 2012, ACM, New York, NY, USA, 75–84.
-
(2012)
Proceedings of the First International Conference on Security of Internet of Things, SecurIT'12
, pp. 75-84
-
-
Ukil, A.1
Bandyopadhyay, S.2
Joseph, J.3
Banahatti, V.4
Lodha, S.5
-
38
-
-
84872855613
-
Enabling data protection through pki encryption in iot m-health devices
-
C. Doukas, I. Maglogiannis, V. Koufi, F. Malamateniou, G. Vassilacopoulos, Enabling data protection through pki encryption in iot m-health devices, in: 2012 IEEE 12th International Conference on Bioinformatics Bioengineering, BIBE, 2012, pp. 25–29.
-
(2012)
2012 IEEE 12th International Conference on Bioinformatics Bioengineering, BIBE
, pp. 25-29
-
-
Doukas, C.1
Maglogiannis, I.2
Koufi, V.3
Malamateniou, F.4
Vassilacopoulos, G.5
-
39
-
-
84963728330
-
Forensic-by-design framework for cyber-physical cloud systems
-
Rahman, N.H.A., Glisson, W.B., Yang, Y., Choo, K.K.R., Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.1
, pp. 50-59
-
-
Rahman, N.H.A.1
Glisson, W.B.2
Yang, Y.3
Choo, K.K.R.4
-
40
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Springer Berlin, Heidelberg Berlin, Heidelberg
-
Paillier, P., Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. 1999, Springer Berlin, Heidelberg, Berlin, Heidelberg, 223–238.
-
(1999)
, pp. 223-238
-
-
Paillier, P.1
-
41
-
-
84928010845
-
Defining the stack for service delivery models and interoperability in the Internet of things: A practical case with openiot-vdk
-
Serrano, M., Quoc, H.N.M., Le Phuoc, D., Hauswirth, M., Soldatos, J., Kefalakis, N., Jayaraman, P.P., Zaslavsky, A., Defining the stack for service delivery models and interoperability in the Internet of things: A practical case with openiot-vdk. IEEE J. Sel. Areas Commun. 33:4 (2015), 676–689.
-
(2015)
IEEE J. Sel. Areas Commun.
, vol.33
, Issue.4
, pp. 676-689
-
-
Serrano, M.1
Quoc, H.N.M.2
Le Phuoc, D.3
Hauswirth, M.4
Soldatos, J.5
Kefalakis, N.6
Jayaraman, P.P.7
Zaslavsky, A.8
-
42
-
-
84942268616
-
Xgsn: An open-source semantic sensing middleware for the web of things
-
J.-P. Calbimonte, S. Sarni, J. Eberle, K. Aberer, Xgsn: An open-source semantic sensing middleware for the web of things, in: 7th International Workshop on Semantic Sensor Networks, Riva del Garda, Trentino, Italy, 2014.
-
(2014)
7th International Workshop on Semantic Sensor Networks, Riva del Garda, Trentino, Italy
-
-
Calbimonte, J.-P.1
Sarni, S.2
Eberle, J.3
Aberer, K.4
-
43
-
-
85026486573
-
-
The oauth 2.0 authorization framework, accessed: 2016-03-11. URL.
-
D. Hardt, The oauth 2.0 authorization framework, accessed: 2016-03-11. URL https://tools.ietf.org/html/rfc6749.
-
-
-
Hardt, D.1
-
44
-
-
85026479262
-
-
Amazon, Amazon elastic compute cloud (amazon ec2)Accessed: 2016-03-7. URL.
-
Amazon, Amazon elastic compute cloud (amazon ec2)Accessed: 2016-03-7. URL https://aws.amazon.com/ec2.
-
-
-
|